Organizations incorporating social media into their daily operations tend to have gaps in policies, and key aspects are often an afterthought, says attorney David Adler, who pinpoints areas to address.
What are the most common types of cyber attacks, and where do organizations find themselves most vulnerable?
According to the new 2013 Cyber Security Study:
47 percent of surveyed organizations know they have suffered a cyber attack in the past year;
70 percent say they are most vulnerable through their...
Java's ubiquity and vulnerabilities have made it the technology most frequently exploited by cyber attackers. So it is timely to closely explore the breadth and state of its deployment among enterprises. Bit9 undertook an examination of these questions, leveraging endpoint data across many organizations.
Download...
If you're considering deploying Virtual Desktop Infrastructure (VDI) based on security considerations, make sure you understand the complete risk profile. Server-based desktop virtualization keeps corporate assets inside the data center rather than on the client. However, VDI does nothing to prevent exploits on the...
Although OCR has changed its standard for determining breaches under HIPAA Omnibus to a more objective assessment, it's still unclear whether the previous harm standard is truly a thing of the past.
Organizations increasingly engage with customers via social media, but managers often fail to incorporate or enforce key policies. Attorney David Adler offers tips to improve social media management.
Addressing cyber-attacks is not just a technology issue. It requires a holistic view from the entire organization, says ISACA's Jeff Spivey, who emphasizes the need for a framework approach to security.
Healthcare organizations aren't performing enough analysis of user behavior to detect possible insider threats, says security consultant Mac McMillan, who outlines the importance of auditing for abnormalities.
What has been the most important type of vulnerability in the last 25 years? What percentage of total vulnerabilities did this represent? Which browser truly had the most critical vulnerabilities? In this research, Yves Younan, senior research engineer with Sourcefire's Vulnerability Research Team (VRT), answers these...
Partners HealthCare is integrating patients' remote monitoring data from medical devices into their electronic health records. But what are the essential security steps for this project?
Despite the new instructions on breach notification in the HIPAA Omnibus Rule, there's still plenty of uncertainty about what constitutes a "compromise" of data that triggers notification, says privacy attorney Adam Greene.
In the face of advanced threats, organizations need to shift their security posture from breach prevention to incident response, says Tom Cross of Lancope, who discusses new strategies.
Mobile device management and application security are just two aspects to consider. What about network security? Dave Jevans of Marble Security discusses a three-tiered approach to mobile security.
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility and productivity of mobile devices. When vulnerabilities are
exploited, the security of mission-critical data becomes a serious concern.
This...
Healthcare organizations need to more closely monitor how staff members access patient information to minimize "insider threats" that could compromise privacy or lead to fraud, says security consultant Mac McMillan.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.